Vectra AI

Vectra AI

Vectra
+
Visit Website

About

Corelight brings you the power of Zeek without Linux issues, NIC problems, or packet loss. Deployment takes minutes, not months. After all, your top people should be threat hunting, not troubleshooting. The most capable platform for understanding and protecting your network is built on open source. You'll have open access to your metadata and the ability to customize and extend your capabilities — together with a vibrant community. We’ve built the leading team of Zeek experts and contributors, and have assembled a world-class support team that continually delights customers with their unparalleled knowledge and fast response times. Proactive, secure, and automatic—when you enable Corelight Dynamic Health Check your Corelight Sensor sends performance telemetry back to Corelight to proactively monitor for things like disk failures or abnormal performance metrics that could indicate a problem.

About

PathSolutions TotalView network monitoring and troubleshooting software bridges the gap between NETWORK MONITORING and TROUBLESHOOTING RESOLUTION telling you WHEN, WHERE and WHY network errors occur. PathSolutions TotalView continuously monitors and tracks the performance of every device and every link in your entire network, going deeper than other solutions by collecting error counters, performance data, configuration information and connectedness. A built-in heuristics engine analyzes all of this information to produce plain-English answers to problems. This means that complex problems can be solved by junior level engineers leaving the senior level engineers to work on more strategic level projects. The core product includes everything needed to run a perfectly healthy network: Configuration management, server monitoring, cloud service monitoring, IPAM, NetFlow, path mapping, and diagramming. Get Total Network Visibility on your network and solve more problems faster.

About

Vectra enables enterprises to immediately detect and respond to cyberattacks across cloud, data center, IT and IoT networks. As the leader in network detection and response (NDR), Vectra uses AI to empower the enterprise SOC to automate threat discovery, prioritization, hunting and response. Vectra is Security that thinks. We have developed an AI-driven cybersecurity platform that detects attacker behaviors to protect your hosts and users from being compromised, regardless of location. Unlike other solutions, Vectra Cognito provides high fidelity alerts instead of more noise, and does not decrypt your data so you can be secure and maintain privacy. Today’s cyberattacks will use any means of entry, so we provide a single platform to cover cloud, data center, enterprise networks, and IoT devices, not just critical assets. The Vectra NDR platform is the ultimate AI-powered cyberattack detection and threat-hunting platform.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Network evidence, investigation, triage, and hunting platform for everyone

Audience

Medium sized companies

Audience

Security centers or IT administrators who want an AI cybersecurity platform to protect their SaaS, cloud and on-premises deployments

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$5,747 perpetual
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 4.9 / 5
ease 5.0 / 5
features 4.6 / 5
design 4.6 / 5
support 4.9 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Corelight
Founded: 2013
United States
www.corelight.com

Company Information

PathSolutions
Founded: 2007
United States
www.pathsolutions.com

Company Information

Vectra
Founded: 2010
United States
www.vectra.ai/

Alternatives

Fidelis Elevate

Fidelis Elevate

Fidelis Security

Alternatives

Alternatives

Arista NDR

Arista NDR

Arista
NetworkMiner

NetworkMiner

Netresec
Site24x7

Site24x7

ManageEngine
Zeek

Zeek

The Zeek Project
NetBrain

NetBrain

NetBrain Technologies
NextRay NDR

NextRay NDR

NextRay AI
AdRem NetCrunch

AdRem NetCrunch

AdRem Software

Categories

Categories

Categories

Network Traffic Analysis (NTA) Features

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Network Automation Features

Compliance Monitoring
Configuration Backup
Configuration Changes
Network Orchestration
Performance Monitoring
Tool Access Control
Vulnerability Assessments

Network Mapping Features

Color Codes / Icons
Compliance Management
Device Auto Discovery
Hierarchical Mapping
Location-Based Mapping
Map Exporting
On-Demand Mapping
Reporting/Analytics
Self-Updating Maps
Web Traffic Reporting

Network Monitoring Features

Bandwidth Monitoring
Baseline Manager
Diagnostic Tools
Internet Usage Monitoring
IP Address Monitoring
Real Time Analytics
Resource Management
Server Monitoring
SLA Monitoring
Uptime Monitoring
Web Traffic Reporting

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Network Troubleshooting Features

Alerts / Escalation
Bandwidth Troubleshooting
Change Management
Configuration Management
Connectivity Management
Data Visualization
Historical Audit
Mobile Network Troubleshooting
Network Analysis
Network Monitoring

Server Management Features

CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring

VoIP Monitoring Features

Alerts / Notifications
Call Detail Record (CDR) Analysis
Call Quality Monitoring
IP SLA Monitoring
Jitter Testing
Latency Monitoring
MOS Monitoring
Packet Loss Monitoring
QoS Monitoring
Reporting / Analytics
Troubleshooting

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Network Security Features

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Integrations

Amazon S3
Carbon Black EDR
Check Point Infinity
Check Point Quantum Network Security
Confluent
Cybraics
Databricks Data Intelligence Platform
EndaceProbe
Forescout
Gigamon
IBM QRadar SIEM
Microsoft 365
Microsoft Azure
New Era
OverSOC
Revelstoke
ReversingLabs
SentinelOne Singularity
WatchTower Security Management App
cPacket

Integrations

Amazon S3
Carbon Black EDR
Check Point Infinity
Check Point Quantum Network Security
Confluent
Cybraics
Databricks Data Intelligence Platform
EndaceProbe
Forescout
Gigamon
IBM QRadar SIEM
Microsoft 365
Microsoft Azure
New Era
OverSOC
Revelstoke
ReversingLabs
SentinelOne Singularity
WatchTower Security Management App
cPacket

Integrations

Amazon S3
Carbon Black EDR
Check Point Infinity
Check Point Quantum Network Security
Confluent
Cybraics
Databricks Data Intelligence Platform
EndaceProbe
Forescout
Gigamon
IBM QRadar SIEM
Microsoft 365
Microsoft Azure
New Era
OverSOC
Revelstoke
ReversingLabs
SentinelOne Singularity
WatchTower Security Management App
cPacket
Claim Corelight and update features and information
Claim Corelight and update features and information
Claim Vectra AI and update features and information
Claim Vectra AI and update features and information